Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Sotgiu, Angelo
Demontis, Ambra
Melis, Marco
Biggio, Battista
Fumera, Giorgio
Feng, Xiaoyi
and
Roli, Fabio
2020.
Deep neural rejection against adversarial examples.
EURASIP Journal on Information Security,
Vol. 2020,
Issue. 1,
Redondo, Alberto
and
Insua, David Ríos
2020.
Protecting From Malware Obfuscation Attacks Through Adversarial Risk Analysis.
Risk Analysis,
Vol. 40,
Issue. 12,
p.
2598.
Brown, Brandon
Richardson, Alexicia
Smith, Marcellus
Dozier, Gerry
and
King, Michael C.
2020.
The Adversarial UFP/UFN Attack: A New Threat to ML-based Fake News Detection Systems?.
p.
1523.
Lee, Daniel
and
Verma, Rakesh
2020.
Adversarial Machine Learning for Text.
p.
33.
Roco, Mihail C.
2020.
Principles of convergence in nature and society and their application: from nanoscale, digits, and logic steps to global progress.
Journal of Nanoparticle Research,
Vol. 22,
Issue. 11,
Berk, Richard A.
2020.
Statistical Learning from a Regression Perspective.
p.
361.
Li, Tommy
and
Merkel, Cory
2021.
Artificial Neural Networks and Machine Learning – ICANN 2021.
Vol. 12891,
Issue. ,
p.
91.
Casula, Roberto
Orru, Giulia
Angioni, Daniele
Feng, Xiaoyi
Marcialis, Gian Luca
and
Roli, Fabio
2021.
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?.
p.
3412.
Fagioli, Simone
2021.
‘I’m your automatic colour’
La colorazione automatica delle immagini in antropologia
.
magazén,
Ranade, Priyanka
Piplai, Aritran
Mittal, Sudip
Joshi, Anupam
and
Finin, Tim
2021.
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models.
p.
1.
Smith, Marcellus
Brown, Brandon
Dozier, Gerry
and
King, Michael
2021.
Mitigating Attacks on Fake News Detection Systems using Genetic-Based Adversarial Training.
p.
1265.
April Pyone, Maung Maung
Kinoshita, Yuma
and
Kiya, Hitoshi
2022.
Frontiers in Fake Media Generation and Detection.
p.
45.
Furrer, Frank J.
2022.
Safety and Security of Cyber-Physical Systems.
p.
263.
Furrer, Frank J.
2022.
Safety and Security of Cyber-Physical Systems.
p.
333.
Rafiq, Fatima
Awan, Mazhar Javed
Yasin, Awais
Nobanee, Haitham
Zain, Azlan Mohd
and
Bahaj, Saeed Ali
2022.
Privacy Prevention of Big Data Applications: A Systematic Literature Review.
Sage Open,
Vol. 12,
Issue. 2,
Freiesleben, Timo
2022.
The Intriguing Relation Between Counterfactual Explanations and Adversarial Examples.
Minds and Machines,
Vol. 32,
Issue. 1,
p.
77.
Rios Insua, David
Naveiro, Roi
Gallego, Víctor
and
Poulos, Jason
2023.
Adversarial Machine Learning: Bayesian Perspectives.
Journal of the American Statistical Association,
Vol. 118,
Issue. 543,
p.
2195.
Marinelli, Marina
and
Janardhanan, Mukund Nilakantan
2023.
Artificial Intelligence and Machine Learning Techniques for Civil Engineering.
p.
247.
Riegler, Erwin
Koliander, Günther
and
Bölcskei, Helmut
2023.
Lossy compression of general random variables.
Information and Inference: A Journal of the IMA,
Vol. 12,
Issue. 3,
p.
1759.
P, Lourdu Mahimai Doss
and
Gunasekaran, M
2023.
Defending Crop Recommendation Systems Against Poisoning and Evasion Attacks.
p.
1.